LandmarkMiner

2021 ◽  
Vol 2 (3) ◽  
pp. 1-22
Author(s):  
Ruixiang Li ◽  
Rui Xu ◽  
Yuanyuan Ma ◽  
Xiangyang Luo

High-confidence network landmarks are the basis of IP geolocation. However, existing landmarks acquisition methods had weakness such as high time cost and insufficient landmarks number. For this, LandmarkMiner, a street-level network landmarks mining method, is proposed based on service identification and domain name association. First, LandmarkMiner trains classifiers using the scanning results of IPs with known hosting service type, identifies the hosting service type of target IPs using the trained classifiers, and obtains the classified IPs’ domain names using DNS. Then, according to institutional names, a database associating institutional name with possible domain names is built by statistical relationship, which is obtained between the known institutional names and their domain names. Finally, geographical location of IP's domain name after classification is matched in the database and online maps, thereby obtaining landmarks and evaluating reliability of them. LandmarkMiner has mined 9,423 reliable street-level landmarks from 304M IPs in 18 cities. Comparing with existing methods, LandmarkMiner increases the number of reliable street-level landmarks significantly and can be applied in different network connectivity conditions.

Author(s):  
Torsten Bettinger

Although the Internet has no cross-organizational, financial, or operational management responsible for the entire Internet, certain administrative tasks are coordinated centrally. Among the most important organizational tasks that require global regulation is the management of Internet Protocol (IP) addresses and their corresponding domain names. The IP address consists of an existing 32 bit (IP4) or 128 bit (IP6) sequence of digits and is the actual physical network address by which routing on the Internet takes place and which will ensure that the data packets reach the correct host computer.


Author(s):  
Adonna Alkema

In the Netherlands, there is no legislation dealing with the registration and use of domain names. Domain name conflicts are therefore decided on the basis of existing laws, such as laws regarding the protection of trademarks and trade names and tort law. Domain name conflicts often lead to court proceedings, resulting in over 500 decisions rendered by first instance courts so far and more than 90 decisions rendered by appeal courts.


Author(s):  
Philipp Fabbio

Statutory provisions dealing specifically with domain names are found in the Codice della Proprietà Industriale (‘the CPI’),1 ss 12(1)(c), 22, 118(6), and 133. Sections 12(1)(c) and 22 define the scope of trademark protection. In doing so, they also consider interference with domain names that are used in the course of a business activity (nomi a dominio aziendali). Sections 118(6) and 133 deal with remedies for trademark infringements and make explicit reference to domain names as well. Besides these specific rules, conflicts before the Italian courts based on domain name registrations are to be resolved according to the general rules of trademark, competition, and civil law.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Meijuan Yin ◽  
Wen Yang ◽  
Xiaonan Liu ◽  
Xiangyang Luo

Street-level landmarks are an important basis for street-level IP geolocation, and the web-based landmark is one of the main sources of street-level landmarks. Considering the existing street-level landmark evaluation methods having low accuracy and strict constraints, this paper analyses the causes and evaluation idea of invalid web-based candidate landmarks and proposes Evaluator, a web-based landmark evaluation approach. Evaluator adopts the idea of the decision tree to filter invalid landmarks layer by layer and comprehensively estimates the quantitative reliability of candidate landmarks with public data and services to obtain reliable landmarks. This paper proposes the domain name system (DNS) distributed query algorithm to effectively resolve all IP addresses of a domain name, which provides data support for Evaluator to filter candidate landmarks. Meanwhile, this paper also proposes a reverse verification algorithm to obtain all domain names of an IP address, which provides an important reference to calculate the reliability of a reliable landmark. In addition, gradient descent is used to assess the parameters of the reliability estimating model, which effectively improves the robustness of Evaluator. Experiments show that reliable landmarks from Evaluator reduce the geolocation error of 100 targets in Hong Kong from 7.30 km to 3.91 km, compared with the landmark verifying method (LVM), one of the latest web-based landmark evaluation methods. Moreover, Evaluator significantly improves the evaluation coverage based on the same geolocation accuracy with street-level landmark evaluation (SLE), one of the latest landmark evaluation methods.


2019 ◽  
Vol 2019 ◽  
pp. 1-9 ◽  
Author(s):  
Hong Zhao ◽  
Zhaobin Chang ◽  
Guangbin Bao ◽  
Xiangyan Zeng

Malicious domain name attacks have become a serious issue for Internet security. In this study, a malicious domain names detection algorithm based on N-Gram is proposed. The top 100,000 domain names in Alexa 2013 are used in the N-Gram method. Each domain name excluding the top-level domain is segmented into substrings according to its domain level with the lengths of 3, 4, 5, 6, and 7. The substring set of the 100,000 domain names is established, and the weight value of a substring is calculated according to its occurrence number in the substring set. To detect a malicious attack, the domain name is also segmented by the N-Gram method and its reputation value is calculated based on the weight values of its substrings. Finally, the judgment of whether the domain name is malicious is made by thresholding. In the experiments on Alexa 2017 and Malware domain list, the proposed detection algorithm yielded an accuracy rate of 94.04%, a false negative rate of 7.42%, and a false positive rate of 6.14%. The time complexity is lower than other popular malicious domain names detection algorithms.


2006 ◽  
Vol 16 (3) ◽  
pp. 343-367 ◽  
Author(s):  
Richard A. Spinello

Abstract:The Internet presents opportunities for corporations to efficiently build their brands online and to enhance their global reach. But there are threats as well as opportunities, since anti-branding and free-riding activities are easier in cyberspace. One such threat is the unauthorized incorporation of a trademark into a domain name. This can lead to trademark dilution and cause consumer confusion. But some users claim a right to use these trademarks for the purpose of parody or criticism. Underlying these trademark conflicts is the familiar tension between property rights and free speech rights. While some trademark scholars are reluctant to consider a trademark as property, we find strong support for the property paradigm in Hegel’s philosophy. Assuming that a trademark is an earned property right, we propose that a trademark owner should be allowed to control the permutations of its trademark incorporated into domain names unless a reasonable person would not confuse that domain name with the company’s mark. But we also conclude that there must be latitude to employ a domain name for negative editorial comment, so long as the source and purpose of that domain name is plainly apparent.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Shichang Ding ◽  
Fan Zhao ◽  
Xiangyang Luo

The geographical locations of smart devices can help in providing authentication information between multimedia content providers and users in 5G networks. The IP geolocation methods can help in estimating the geographical location of these smart devices. The two key assumptions of existing IP geolocation methods are as follows: (1) the smallest relative delay comes from the nearest host; (2) the distance between hosts which share the closest common routers is smaller than others. However, the two assumptions are not always true in weakly connected networks, which may affect accuracy. We propose a novel street-level IP geolocation algorithm (Corr-SLG), which is based on the delay-distance correlation and multilayered common routers. The first key idea of Corr-SLG is to divide landmarks into different groups based on relative-delay-distance correlation. Different from previous methods, Corr-SLG geolocates the host based on the largest relative delay for the strongly negatively correlated groups. The second key idea is to introduce the landmarks which share multilayered common routers into the geolocation process, instead of only relying on the closest common routers. Besides, to increase the number of landmarks, a new street-level landmark collection method called WiFi landmark is also presented in this paper. The experiments in one province capital city of China, Zhengzhou, show that Corr-SLG can improve the geolocation accuracy remarkably in a real-world network.


2007 ◽  
Vol 6 ◽  
pp. 39-63
Author(s):  
Jorge Alberto Fierro Abella

El desarrollo de la llamada red de redes o internet ha supuesto un cambio sustancial en la forma de entender las relaciones comerciales. La extensión del acceso a aquella a un número cada vez mayor de agentes económicos, unido a un crecimiento continuo de los contenidos de toda índole disponibles en la red, implica que la facilidad con que se acceda a la información de una determinada compañía tenga un elevado valor. El objetivo de este documento de reflexión es ofrecer en primer lugar, un panorama general del marco teórico en el que se desarrolla la actividad de registro de nombres de dominio, tanto en el ámbito internacional como en el local (España) y su relación con el derecho de marcas, para a partir de ello exponer una serie de casos, que tienen una relación directa con España, bien por tratarse de resoluciones de nuestros tribunales, bien por ser asuntos en los que se discutía la titularidad de nombres de dominio en los que aparecía como perjudicado (real o pretendido) una marca o nombre comercial española o al menos con presencia en este país. Abstract Domain names are the familiar and easy-to-remember names for internet computers. They map to unique Internet Protocol (IP) numbers that serve as routing addresses on the Internet. The domain name system (DNS) translates internet names into the IP numbers needed for transmission of information across the network. The challenge pursued by the following research is to provide a general outlook of the theoretical frame for the technical activity of domain name registration procedure, as well as the implication of complementary sources of rules. The territorial context of the analysis is only apparent, since the empirical application of concepts can also be applied by other jurisdictions. Palabras Claves Nombre de dominio, marcas, marcas de internet, derecho de marcas, competencia desleal, usurpación de marcas. Keywords Nombre de dominio, marcas, marcas de internet, derecho de marcas, competencia desleal, usurpación de marcas


The present article deals with conflicts arising out of registration of domain names of existing trade names with the intention to resell it and/or encash the goodwill. Such practice is known as ‘Cybersquatting’. Registration of Domain names and acquiring a domain name of choice has become a rage over the time. It is the first come first get thing for getting registered. In this paper the researcher has explained what a cybersqatting is alongwith various types of cybersquatting and its prevention and targets. This paper also suggests remedial measures to deal with cybersquatting. The Anti Cybersquatting Consumer Protection Act (ACPA), an enactment by United States, needs a special applaud for being the first country to have introduced a special act for dealing with the menace of cybersquatting which was the need of the hour. It so happens that people opt to buy the domain name from squatters as it being cheap instead of seeking remedy from the court of law


2021 ◽  
Vol 9 ◽  
Author(s):  
Haiyan Xu ◽  
Zhaoxin Zhang ◽  
Bing Han ◽  
Jianen Yan

DNS plays an important role on the Internet. The addressing of most applications depends on the proper operation of DNS. The root servers and the top-level domain servers are relied upon by many domains on the Internet, and their security affects the whole Internet. As a result, more attention has been paid to the security of servers at these two levels. However, the security of second-level domains and their servers also needs to be brought to the forefront. This paper focuses on showing the complex resolving dependencies and identifying influential name servers for second-level domains. We start by detecting domain name resolution paths and building up a name dependency graph. Then we construct domain name resolution networks of different numbers and sizes, which are connected by a certain number of domain name resolution graphs. On this basis, the network is analyzed from the perspective of complex network analysis, and a multi-indicators node importance evaluation method based on partial order is proposed to identify the influential name servers of the network. Once these name servers are not properly configured and fail or are compromised by DDoS attacks, it will cause resolution failure for a wide range of domain names.


Sign in / Sign up

Export Citation Format

Share Document